Trojans: $300 for your data

 

A new Trojan has been created that infects the system and when demands the victim to pay $300 for a software that may restore those files. It has been identified by such security companies as PandaLabs and Kaspersky Lab. Compared to previous viruses of this sort this new ransomware definitely raises the stakes.

This new Trojan is not the first one that demands money for the victims, yet the sum is highest. There has been one that threatened the users that every 30 minutes infected file will be deleted, unless the user paid a ransom of $10.99. Another one infected the system and demanded the victims to purchase some products from an online drug store.

The Trojan after infecting computer sends a note in broken English that some files have been encrypted via RSA-4069 and they will be shared all over the world and when deleted unless a sum of money ($300 in this case) is forked over within a period of time. PandaLabs made a statement that these threats are not very real, because the files merely remain encrypted. Moreover, these Trojans has a limited shelf life of between July 10 to July 15, for some no particular reason. 

There’s still no information, whether the software, victims are to purchase works or not, or what happens if the user tries to contact the email address. Yet PandaLabs nor Kaspersky Lab says that you shouldn’t pay under any circumstances. Although Kaspersky Lab is working on decrypting the infected files, no antivirus solution exists at the moment, so paying the required sum may be the only way out.

The virus spreads through the network instead of via file attachments, so the Trojans are allowed to act as socket servers while the ports are open.

The best solution to keep your system safe is definitely to have a good prevention system. If you do not have the latest software you’re system is in danger and some files including sensitive information may be stolen irretrievable, without even knowing it.    
  

 

 
 

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title="" rel=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>